Day[0]

A podcast by dayzerosec

Categories:

259 Episoade

  1. [bounty] Client-Side Path Traversal and Hiding Your Entitlement(s)

    Publicat: 17.01.2023
  2. [binary] Attacking Bhyves and a Kernel UAF

    Publicat: 12.01.2023
  3. [bounty] Web Hackers vs. Cars and a Facebook Account Takeover

    Publicat: 10.01.2023
  4. [binary] JS Type Confusions and Bringing Back Stack Attacks

    Publicat: 15.12.2022
  5. [bounty] Pwn2Own Bugs and WAF Bypasses

    Publicat: 13.12.2022
  6. [binary] A Huawei Hypervisor Vuln and More Memory Safety

    Publicat: 08.12.2022
  7. [bounty] Remotely Controlling Hyundai and a League of Legends XSS

    Publicat: 06.12.2022
  8. [binary] Patch Gaps and Apple Neural Engine Vulns

    Publicat: 01.12.2022
  9. [bounty] Tailscale RCE, an SQLi in PAM360, and Exploiting Backstage

    Publicat: 29.11.2022
  10. [binary] Hacking Pixel Bootloaders and Injecting Bugs

    Publicat: 24.11.2022
  11. [bounty] Racing Grafana, Stealing Mastadon Passwords, and Cross-Site Tracing

    Publicat: 22.11.2022
  12. [binary] Exploiting Undefined Behavior and a Chrome UAF

    Publicat: 17.11.2022
  13. [bounty] Bypassing Pixel Lock Screens and Checkmk RCE

    Publicat: 15.11.2022
  14. [binary] OpenSSL Off-by-One, Java XML Bugs, and an In-the-Wild Samsung Chain

    Publicat: 10.11.2022
  15. [bounty] Apache Batik, Static Site Generators, and an Android App Vuln

    Publicat: 08.11.2022
  16. [binary] XNU's kalloc_type, Stranger Strings, and a NetBSD Bug

    Publicat: 03.11.2022
  17. [bounty] A Galaxy Store Bug, Facebook CSRF, and Google IDOR

    Publicat: 01.11.2022
  18. [binary] Edge Vulns, a SHA-3 Overflow, and an io_uring Exploit

    Publicat: 27.10.2022
  19. [bounty] XMPP Stanza Smuggling in Jabber and a Cobalt Strike RCE

    Publicat: 25.10.2022
  20. [binary] Some Browser Exploitation and a Format String Bug?

    Publicat: 20.10.2022

5 / 13

A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.

Visit the podcast's native language site